Secure software architectures

被引:17
|
作者
Moriconi, M
Qian, XL
Riemenschneider, RA
Gong, L
机构
关键词
secure systems; software architecture; X/Open DTP; formal methods; access control;
D O I
10.1109/SECPRI.1997.601320
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which the various representations of the architecture of a software system are described formally and the desired security properties of the system are proven to hold at the architectural level. The main ideas are illustrated by means of the X/Open Distributed Transaction Processing reference architecture, which is formalized and extended for secure access control as defined by the Bell-LaPadula model. The extension allows vendors to develop individual components independently and with minimal concern about security. Two important observations were gleaned on the implications of incorporating security into software architectures.
引用
收藏
页码:84 / 93
页数:10
相关论文
共 50 条
  • [1] Design of Secure Software Architectures with Secure Connectors
    Shin, Michael E.
    Gomaa, Hassan
    Pathirage, Don
    Baker, Chase
    Malhotra, Bhavya
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2016, 26 (05) : 769 - 805
  • [2] A formal approach to designing secure software architectures
    Yu, HQ
    He, XD
    Deng, Y
    Mo, L
    EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS, 2004, : 289 - 290
  • [3] Industry 4.0 needs secure Software Architectures
    不详
    ATP EDITION, 2015, (03): : 7 - 7
  • [4] Secure software Architectures design by aspect orientation
    Yu, HQ
    Liu, DM
    He, XD
    Yang, L
    Gao, S
    ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 47 - 55
  • [5] Design and evaluation of secure software architectures for web applications
    Ambrose, Jude Angelo
    Petkov, Emil
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS, 2006, : 365 - 370
  • [6] Threat-Driven Design and Analysis of Secure Software Architectures
    Xu, Dianxiang
    Pauli, Joshua J.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 171 - 180
  • [7] A Software Product Line Approach to Design Secure Connectors in Component-Based Software Architectures
    Shin, Michael
    Gomaa, Hassan
    Pathirage, Don
    SOFTWARE TECHNOLOGIES, ICSOFT 2018, 2019, 1077 : 372 - 396
  • [8] Secure architectures
    Gibson, S
    Gorain, S
    Povey, D
    Clutterbuck, P
    MIDDLEWARE'98: IFIP INTERNATIONAL CONFERENCE ON DISTRIBUTED SYSTEMS PLATFORMS AND OPEN DISTRIBUTED PROCESSING, 1998, : 275 - 290
  • [9] Secure Architectures
    Sethumadhavan, Simha
    Tiwari, Mohit
    IEEE MICRO, 2019, 39 (04) : 6 - 7
  • [10] Introduction to Architectures, Tools, and Methods for Safe and Secure DevOps Software Engineering Minitrack
    Tamburri, Damian
    Van den Heuvel, Willem-Jan
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 7057 - 7057